Skip to main content

Posts

Showing posts from September, 2021

Mobile hacking

Mobile phishing is not a new phenomenon. Almost anyone old enough to remember using pre-smartphone mobile devices also remembers getting suspicious texts and calls from early scammers. Often,  these scam artists used some variant of the now-campy Nigerian Prince scheme to trick victims . But times have changed. Today’s mobile phishing attacks are sophisticated, high-tech, and largely automated. Mobile phones have taken on a more important role in users’ lives than ever before, and the world’s hackers have access to more data than the previous generations could dream of. Without  mobile phishing protection , users are vulnerable. The vast majority of cybersecurity content dealing with phishing focuses on the desktop environment. However, mobile users are just as exposed as desktop users are – but they often don’t even know it. 👇👇👇👇👇 Mobile hacking full course ...

🌀 How to install Metasploit in Termux 🌀

If you installed termux just uninstall it or clear Termux Data this is first step. Now install termux and execute the following commands to install metasploit in Termux 🔴 Commands 🔴 apt update && apt upgrade  apt install unstable-repo  apt install metasploit After installation Type ./msfconsole  👇👇👇👇👇👇👇👇 ➖ sharma_hacking ➖